Call For Presentations
Cloud in the Enterprise Security in the Enterprise Mobile and Social Networking in the Enterprise The Dark Side of Virtualization Big Data - Big Analytics - Big Needs SHARE, it’s not an acronym; it’s what we do!Winter 2014 Anaheim
Sunday, March 9, 2014 - Friday, March 14, 2014
Anaheim, CA
Suggested Hot Topics for 2014
Cloud computing is not just vaporware anymore. IT organizations are adopting cloud as a service paradigm that has supporting infrastructure and software technologies. They are deploying private clouds in order to manage access, security and reliability. How does a business choose between build vs buy? How might they use cloud as a resource for disaster recovery, business continuity or business resilience?
In today's extended compute environment of big business data, increased usage of mobile devices and incorporation of social into the business environment the potential security threats and increased need for having the ultimate security protection of data and transactions is the top of the list for businesses. The cloud computing model offers some security, often at one size fits all, with unknown risks typically borne by the organization.. The ability to control access points according to corporate policy and in compliance with governmental policies is changing the way corporations set up their systems and prepare for audits. Consider including security disciplines ranging from intrusion detection, data access and protection, user identification and authentication, encryption, key management, auditing and compliance, and more!
Mobile devices and Social Networking have taken off at an astonishing rate, and that trend is only going to continue. This explosion is certainly making its presence felt in the corporate world. IT needs to take control of the situation quickly. But what exactly should we be concerned about? Security? Performance? Capacity? What policies need to change? What automation options are available?
We all understand the efficiencies that can be realized with virtualization such as reduction of power needs, reduction of space needs and improved reliability. But do we understand the issues that virtualization may introduce in terms of management complexity, security, performance and privacy. For example, when you create a virtual LAN to connect virtual systems, how do you do intrusion detection or provide some service like firewall? Now that we have hundreds of guest servers, how are we going to perform maintenance on the hosting system?
We have seen the opportunities to manage Big Data and derive benefits never before realizable. But do we comprehend the underlying requirements for bandwidth, processing capacity and storage capacity? Do we have a plan to manage those as well as the inherent security, compliance and privacy issues? Do you have any plan to manage personally identifiable information (PII) in that environment? With all that accomplished, now how do we deliver the data to the processes that will analyze it? What parts of our business would benefit most if we manage to solve these issues?
Submitting a Session
Please click on the arrow next to each session type below to read full Program descriptions and to access the submission links for each session type. Unless you are familiar with the Program structure of SHARE, please select 'General Submissions' as the topic for your submission.
The deadline for submitting a session is Friday, October 4, 2013.
To Login to an Existing Session
If you have already submitted a Session and you wish to VIEW, RESUME, EDIT or WITHDRAW that submission, then log in below using the Session ID Number and Password already provided to you:
Lost Password? Click here and we will send you another email with a link to your submission.